• Nem Talált Eredményt

On Network Topology Augmentation for Global Connectivity under Regional Failures

N/A
N/A
Protected

Academic year: 2022

Ossza meg "On Network Topology Augmentation for Global Connectivity under Regional Failures"

Copied!
11
0
0

Teljes szövegt

(1)

On Network Topology Augmentation for Global Connectivity under Regional Failures

J´anos Tapolcai, Zsombor L. Hajd´u, Alija Paˇsi´c, Pin-Han Ho, Lajos R´onyai

MTA-BME Future Internet Research Group, Faculty of Electrical Engineering and Informatics (VIK), Budapest University of Technology and Economics (BME), {tapolcai,hajdu,pasic}@tmit.bme.hu

Dept. of Electrical and Computer Engineering, University of Waterloo, Canada, p4ho@uwaterloo.ca

Institute for Computer Science and Control, E¨otv¨os Lor´and Research Network (ELKH SZTAKI) and BME, ronyai@sztaki.hu

Abstract—Several recent studies shed light on the vulnerability of networks against regional failures, which are failures of multiple nodes and links in a physical region due to a natural disaster. The paper defines a novel design framework, called Geometric Network Augmentation (GNA), which determines a set of node pairs and the new cable routes to be deployed between each of them to make the network always remain connected when a regional failure of a given size occurs. With the proposed GNA design framework, we provide mathematical analysis and efficient heuristic algorithms that are built on the latest computa- tional geometry tools and combinatorial optimization techniques.

Through extensive simulation we show that augmentation with just a small number of new cable routes will achieve the desired resilience against all the considered regional failures.

I. INTRODUCTION

The Internet backbone’s physical infrastructure consists of thousands of kilometers of undersea, aerial, and buried fiber- optic cables. Several natural disasters, such as earthquakes, hurricanes, and tsunamis, may destroy a number of nodes and links located in possibly a few hundred kilometers wide geographic area [1]–[9], leading to aregional failure.

Since the area of a regional failure is relatively small compared to the size of the backbone, the question naturally comes up: how to ensure the residual network connectivity in the presence of such a failure event? Several techniques are reported to enhance a network topology so as to survive through a regional failure, which can be summarized into the following three classes.

(1) Purchase existing dark, shared fiber assets [10], [11], which is the most common method.

(2) Shield existing fibers [12], [13], at the expense of signif- icantly increased network cost.

(3) Install new fiber cables [14], [15], which is effective only if the new cables are properly placed.

This study follows the strategy of (3), where the problem is to determine which node pairs are allocated with new cable routes (or links), and once we have these node pairs, how the links are geographically placed/routed to achieve the required resilience to any possible regional failure of a given size. Here, the required network resilience is said to be achieved if there are no isolated components in the presence of any regional failure.

Regional failures can be described with the help of Shared Risk Link Groups (SRLGs), and many of the pre- viously reported studies were investigating the protection of SRLGs [16]–[19], mostly in the aspects of failure modeling, network planning, and survivable routing [13], [20]–[24].

Several insightful works were reported on how to model a regional failure event [1]–[9], [25], [26], most of which assume a given shape of an enclosing area for the considered disasters, such as a circular disk. These studies are essential for creating real-like failure scenarios; however, they do not contribute directly to enhancing the survivability of the networks.

In [27]–[29], the possibility of utilizing geo-diverse routing is discussed for increasing network survivability of regional failures, where the spatial separation between disjoint paths can be ensured. This study also assumes that any network equipment covered by a circular disk centered at the epicenter of a given radius, say 50km, could fail. Note that these studies can ensure service continuity in the presence of regional failures if the survived part of the network remains connected upon a failure, which may not always be the case. This motivates another design dimension via network planning that aims to create a regional failure survivable network [12], [30]–

[32].

The impacts of natural disasters on terrestrial and submarine cables have been assessed in [1], [5], [33]–[35] and [36], [37], respectively. In [14], a disaster-aware submarine cable deploy- ment algorithm was devised by exploring a greenfield network planning approach, which avoids the network infrastructure to be deployed in the disaster areas. In [15], a cost-effective approach was presented for planning submarine cable routes (paths) with minimized overall life-cycle cost of the submarine cables. By assuming irregular shapes of the cable routes, an Integer Linear Program (ILP) was formulated for physical path selection, whose optimality is nonetheless affected by some additional constraints. Note that the study did not consider to plan several paths simultaneously.

In [38], the concept of multiple region-based connectivity was introduced as a metric for massive yet localized faults, which again leveraged the greenfield fault-tolerant network de- sign principle. In [39] as a strategy to strengthen the resilience of optical networks against disasters, the concept of emergency optical networks and hierarchical addressing was investigated.

(2)

In [40], stochastic models and risk-minimizing node relocation schemes were proposed by manipulating where each node should be moved. In [15], the problem of how to lay down a single cable (or how to find the path) to connect two points across an Earthquake Fault Line was considered. The paper formulates the problem as multi-objective optimization of cable cost and failing probability of the cable, and further provides meaningful insights on the possible cable shape alternatives.

In our paper, we take a completely different angle from all the previous research in the sense that all the nodes are static in the graph (i.e., no reallocation is considered), while the network is augmented by adding multiple cable routes/links to create regional failure resilient networks. The main contributions of this paper are listed as follows:

We introduce a novel framework of regional failure pro- tection via link augmentation. Due to the high complexity of the formulated problem, an efficient heuristic algorithm is provided where the original problem is divided into a master problem and a sub-problem.

The sub-problem tackles how to add links between given end nodes concerning each possible regional failure.

Here we solve the problem via the latest computational geometry tools that show great effectiveness. We prove several vital properties of the optimal cable routes.

We introduce three algorithms to solve the master prob- lem, that aim to select the node pairs to connect by new edges. For each edge it also computes the cable routes, end ensures that every possible regional failure is protected by a new edge.

We provide extensive simulation results to assess the performance of the proposed algorithms in terms of total cable length and required runtime, followed by detailed discussions and insights on the proposed problem and design framework. We conclude that our approaches can find near-optimal augmentation with decent computation time for numerous real-world network topologies.

The rest of the paper is organized as follows. Section II presents the system model. Section III discusses the computa- tional geometry sub-problem, called Shortest Detours Problem (SDP), which serves as the building block of the proposed design framework. In Section IV, we present the proposed algorithmic framework for the Geometric Network Augmenta- tion (GNA) Problem. In Section V we present the experimental results. Section VI concludes our paper.

II. MODEL ANDASSUMPTIONS

The network is modeled as an undirected connected geo- metric graph G = (V,E) with n = |V| nodes and m = |E|

edges, m≥n−1. The nodes of the graph are embedded as points in the Euclidean plane, and each edge is considered to be a line segment. Note that it is straightforward to extend this study to the scenario where the routes of physical fibers are modeled as polygonal chains specified by sequences of corner points.

The paper utilizes thedisk failure model with fixed radius, where a regional failure occurs at a point known as the epicenter that corresponds to an area in a shape of circular disk cof radiusr. All network elements intersecting with the area are affected, and all other network elements are unaffected.

Definition 1. A circular disk failure c hits an edge e if e intersects the interior of disk c. Similarly node v is hit by failurecif it is in the interior ofc. LetEc(andVc) denote the set of edges (and nodes) hit by diskc.

Definition 2. A network survives a circular disk failure c if the graphGc= (V \ Vc,E \ Ec)is connected. Otherwise, ifGc

is not connected, then the center ofcis called a danger point.

The applicability of the above definitions is straightforward if the affected regions are of circular shape. For many disasters, the damage is mainly determined by the physical distance to the epicenter, e.g., attacks via mass destruction weapons.

However, some natural disasters cause a damaged area of a specific shape; e.g., tsunamis damage areas near the sea shore, earthquakes are likely to happen in seismic zones, and flooding can happen along a riverside [41]. Nevertheless, we argue that our definitions are relevant in these scenarios as well, where the nodes/links may not be affected by failure even if they fall within the disk of the failure. The intuition is that the nodes in the disk are not protectable with a reasonable cost from the corresponding failure event and thus their connection to the network cannot be guaranteed. Instead of dealing with the problem of maintaining service continuity in the catastrophic region, our goal of this study is to guarantee the Internet connectivity for those nodes far enough from the center of the disaster.

To reach our goal, we take the strategy of (3) by installing new fiber-optic cables. For easier understanding, we assume that the cost of adding a new cable is proportional to its physical length, although in reality the costs greatly depend on the terrain and other factors.

Section III-A will discuss how to modify the proposed de- sign framework for a general cost function of installing cables.

The proposed GNA framework aims to find the minimum cost network topology augmentation to survive a single circular disk failure of radiusrat any location. The problem of GNA is given as follows.

Geometric Network Augmentation (GNA) Problem

Input :A network represented by an undirected geometric graph G = (V,E), where the nodes are embedded as points, and the edges as line segments in the Euclidean plane, and maximum radiusrof a possible regional failure.

Output: Add curves as new edges to E, such that the network survives any circular disk failure of radius r (see Def. 2), and the total length of the curves is minimal.

(3)

radiusr

a b

Z C

(a) Long edge,|ab| ≥4r

a b

radiusr

Z1

Z2

C1

C2

(b) Very short edge,|ab|<2r

a b

Z1

Z2

C1

C2

radiusr

(c) Short edge,2r≤ |ab| ≤4r Fig. 1. A network of two nodes and a link. The danger zones are colored blue, where the radiusrof the circular disk is drawn as a line segment in the bottom of the figure. These are the optimal solutions. For brevity, we omit the proof here.

A. Example Network

The proposed GNA problem is demonstrated via a simple example, as shown in Fig. 1a. According to Def. 2 the network is survivable to any circular disk failure with its center closer than r to any of the nodes. It is because the network would have one active node after the failure. The network also survives if the center of the disk is farther than r to the link.

The rest of the points on the plane are the danger points, by which the network is separated into two disjoint nodes and does not survive the failure.

Definition 3. A danger zone is a connected set of danger points in the plane.

The network in Fig. 1a has a single danger zone colored in blue. To make the network survive any disk failure of radius r, we need to add an edge of a curve with a distance of at least rto the danger zone. The complement of therdistance neighborhood of the danger zone, colored in green, is where the new edge can traverse through. The curve in red shown in the figure is a feasible solution to the simple example.

The above example assumes that the link connecting the two nodes is much longer than r. If the link is shorter than 4r, a more economical solution is to add two new edges, see Fig. 1b and 1c. For |ab|<2r, the set of danger points form two connected areas; i.e., we have two danger zones. Similar to Fig. 1a, each new edge is going to be an arc with distance r from one of the danger zones.

It is interesting to note that adding two new edges is cheaper than a single edge (like Fig. 1a) for2r≤ |ab| ≤4r, where we have a single danger zoneZ, but it is more economical to cut it into two areas, denoted byZ1 andZ2, along line segmentab, the new edge C1 (andC2) is a curve withrdistance fromZ1

(Z2, resp.) the halved danger zone. SinceZ1∪Z2≡Z, every danger point is protected by either curve C1 orC2. Note that if the length of the edge is 4r, both solutions, i.e., the single edge (Fig. 1a) and the two edge (Fig. 1c) solutions, have an equal cost.

III. ALGORITHMS TOCOMPUTEOPTIMALCABLEROUTES

In this section, we define the Shortest Detours Problem (SDP) for a single pair of nodes, which serves as the building block in solving the GNA problem. We will first present the

single curve and multi-curve cases, followed by a heuristic algorithm for the multi-curve scenario.

Subproblem:Shortest Detours (SDP) Problem

Input : A finite union Z of danger zones (these are connected areas), distance r ≥ 0, and two points on the planea andb whose distance toZ is at least r.

Output:A set oflcurvesCZab={C1, . . . , Cl}with minimal total length connecting a and b such that for any pointz∈Z there is a curve whose distance toz is at leastr.

A. Single Curve SDP Solution

If the optimal solution is a single curve (i.e., l = 1), after offsetting (inflating)Zby radiusr, the problem can be solved with thegeometric Dijkstra algorithm: computing the shortest path between two points in the presence of obstacles [42]–[44].

The corresponding computational geometry problem received particular attention in the last decades for various emerging application scenarios, such as robot motion planning in a warehouse setting. Constant radius offsetting for curves and surfaces is also a widely studied geometric operation due to its immediate application in manufacturing, which involves the use of computers to control machine tools such as drills and lathes. In general, offsetting is one of the most difficult geometric operations in the sense of implementation [45]. In this study, nonetheless, the SDP is a special case of offsetting where the areas are bounded by line segments and circular arcs only, leading to a problem that is easy to solve [46].

Claim 4. The optimal solution of the SDP with l = 1 and uniform cost on danger zone Z can be found in polynomial time. The obtained curveCis defined as theshortestr-detour of Z.

Proof:Offsetting areas bounded by line segments and cir- cular arcs can be done in polynomial time [46]. The worst-case complexity of geometric Dijkstra algorithm is O(n0logn0), where n0 is the total number of vertices in the obstacle polygons [44]. In our case, n0 is bounded by a polynomial function of the number of linksm.

Note that there are efficient open-source implementations for offsetting and the geometric Dijkstra algorithm. Further,

(4)

1.9 2 2.1 2.2 2.3 6

7

|ab|

|CabZ| 2.3r+ 2|ab|

4rarcsin| ab| 2r

3|ab| π|ab|

Fig. 2. The upper bounds of Claim 5 forr= 1.

It is easy to verify that the bounds are at most π|ab|, thus there cannot be more than 3 curves in the optimal solution. Note that the bound is larger than3|ab|only if1.99r <|ab|<2.3r.

a b

D1

D2

Fig. 3. The illustration of the proof of Theorem 1. The three curvesC1,C2, C3, must entirely be inside the ellipse Ewith fociaandband major axis of length 1.16.

Z

Z1

Z2

a b

radiusr

Fig. 4. An example ofZwhen the division ofZthrough line ab is not optimal. The blue curves correspond toZdivided by lineab, and the red curves are the optimal solution, where Zis divided intoZ1andZ2 as shown.

algorithms to handle cable installation costs are available on GPU [47]. It can consider “traverse speed” when constructing a path from a source point to every point on the plane. In our case, the traverse speed would be the cost of installing a new fiber on each location. This local cost depends on the existing infrastructure, terrain, and other factors.

B. Multi-Curve SDP Solution (l≥2) for Uniform Cost The examples of Fig. 1b and 1c motivate us to deal with the case when l= 2or even larger l. Forl= 2we divide Z into two disjoint parts Z1 and Z2, to obtain C1, the shortest r-detour curve forZ1, andC2, the shortestr-detour curve for Z2. Note that C1 andC2 protects every point in Z1 andZ2, respectively, and only one out of the two curves operates in case of a disaster with an epicenter inZ, sinceZ≡Z1∪Z2. In the following paragraphs, we give an upper bound on the length of the curves based on the blue solution in Fig. 1c.

Claim 5. LetCZab be optimal curves for SDP for uniform cost.

Then the total length of the curves is at most (see also Fig. 2)

|CZab|<2.3r+ 2|ab|, if |ab| ≥2r and

|CZab| ≤4rarcsin |ab|

2r

, otherwise, where |ab|denotes the distance between points a andb.

Proof: In the proof we will provide a feasible solution and determine its cost. For the first inequality we take the blue solution in Fig. 1c, where both curves start and terminate with a quarter circle of radiusrfollowed by a line segment parallel with the line through pointsaandb. The length of each quarter circle is 12rπ, while the line segment is |ab| −2r long. One can verify that this is always a valid solution because,aandb are outside ofZ with distance at leastr. In the solution there are two curves, denoted by C1andC2, and their length is

|CZab| ≤ |C1|+|C2|= 4·1

2rπ+ 2·(|ab| −2r)<2.3r+ 2|ab| . For the second inequality, we take the solution in Fig. 1b, where the two paths are two arcs of a circle with radius r.

Let αdenote the half of the angle of the arc, where we have sinα= |ab2r|. Thus α= arcsin|

ab| 2r

, and the length of each arc is 2rarcsin|ab|

2r

.

Theorem 1. The number of curves in the optimal solution is l= 1or 2 for uniform cost.

Proof:Suppose for contradiction that the optimal solution for an instance of SDP consists of three curves C1, C2, C3. Without loss of generality, we assume that a,b are on a horizontal line and |ab| = 1. Then Claim 5 implies that 1.99r≤ |ab| ≤2.3·r (the first inequality follows from the fact that the function3x−4 arcsin(x/2)stays positive on the interval(0,1.99]), hence0.51> r >0.4. Due to the fact that the total length of the solution is at most π|ab|, we obtain that 1 ≤ |Ci| < π−2 < 1.16 for i = 1,2,3. This implies that the curves Ci must be entirely inside the ellipse E with focia andb and major axis of length 1.16. The length of the semi-major axis of E isA= 1.162 =.58and the semi-minor axis is B =√

.582−.52 < .294. The circumference` of E is less than ` ≤ √

2π·√

A2+B2 <2.9. Here we used the upper bound on the perimeter of an ellipse from Proposition 3 of Jameson [48].

Now cutEwith vertical lines throughaandband letD1be the path starting ataand moving vertically up to the bordering arc ofEat pointa1and then proceed on the arc untilb1, where the vertical line passing throughbintersectsE and then move tob in the vertical direction (see Fig. 3). We have a similar pathD2froma througha2andb2tob in the part ofEbelow the line ofab. The total length ofD1andD2is at most` <3;

hence they cannot give a correct solution to SDP. Therefore, there exists a point z ∈ Z on the plane and points p∈ D1 q∈D2such that the diskDof radiusrcentered atzcontains pandqin its interior.

It suffices now to exhibit a pointp0on the upper arca1b1of Eandq0of the lower arca2b2ofE such that bothp0andq0are in the interior of D. Then the line segmentp0q0 intersects all of the curvesCi and stays in the interior ofD, which implies that these curves do not protect against failure atz.

To establish the existence of p0, we considerp. Ifp is on the arc a1b1 of E, then p0 =p is a correct choice. Suppose now thatpis on a vertical part ofD1. Wlog we assume that it is on the vertical part aa1. Using the fact that a is not in the interior ofD, we see that z must lie over the line of ab. Also,z is to the right of the line ofaa1, because the interior of D intersects D2. The distance of z from aa1 is at most 0.51, hence it is to the left of the line of bb1. Suppose first

(5)

a b c

e d

R1 R2

R3

R4 R5

Danger zones as cuts:

Z1 a {b, c, d, e}

Z2 e {a, b, c, d}

Z3 d {a, b, c, e}

Z4 c {a, b, d, e}

Z5 b {a, c, d, e}

radiusr

(a) The danger zones are colored blue, and red dotted lines show the border of the zones after offsetting byr.

(b) Solution for smallr (c) Solution for larger Fig. 5. An example network of 5 nodes and 5 links.

that z ∈ E. Consider now the highest point h of D. Thish is outside E because |hz| = r > 0.4 > B. Now p0 may be the intersection point of hzand the arc ofE. Clearly,p0 is to the right ofaa1 and is to the left of bb1, and overab, as the whole segment hzis in these half planes.

A similar consideration shows that if z 6∈ E, then the intersection of the segment pz with the border of E gives a suitable p0.

A suitable point q0 can be constructed by using q in an analogous way. This finishes the proof.

C. Heuristic Algorithm for Two Curve SDP Solution

Based on the above, we implemented the following straight- forward heuristic to compute C1 andC2for l= 2in the case of a generalZ. We divideZ by the line ofabintoZ1andZ2, and curve C1 is at distance r fromZ1 andC2 is at distance r from Z2. Finally, we compare the total length |C1|+|C2| with the single curve solution|C|which is of distance at least r fromZ.

The above heuristic is not optimal, even for a uniform cable cost. Fig. 4 shows an example shape of Z, where dividing Z by the line through points a and b does not give the optimal solution (blue curves). ThenZ1andZ2are the optimal division of Z into two disjoint areas, which are shaded with two different blue colors. Because of the specific shapes of the danger zones, the heuristic managed to find the optimal solution in all examined problem instances. The GAP between the costs in Fig. 4 is only>8%. We leave for future research

a b

c e d

Z1Z2 Z3Z4 Z5

Z6 Z7

Z8

Z9 Z10

Z11

Danger zones as cuts:

Z1 a {b, c, d, e}

Z2 a b {d, e}

Z3 e {a, b, c, d}

Z4 e d {a, b}

Z5 e d {a, b, c}

Z6 d {a, b, c, e}

Z7 d {a, b, e}

Z8 c {a, b, d, e}

Z9 b {a, c, d, e}

Z10 b {a, d, e}

Z11 b {a, c, d, e}

radiusr

(a) The danger zones of the small network with larger radius.

Disaster cut

Danger zones

Cuts:

v1 Z1 a {b, c, d, e}

v2 Z2 a {b, d, e}

v3 Z2,Z10 b {a, d, e}

v4 Z2,Z4 {a, b} {d, e}

v5 Z3,Z5 e {a, b, c, d}

v6 Z4 e {a, b, d}

v7 Z4,Z7 d {a, b, e}

v8 Z5,Z6 d {a, b, c, e}

v9 Z5 {e, d} {a, b, c}

v10 Z8 c {a, b, d, e}

v11 Z9,Z11 b {a, c, d, e}

ab ac ad ae bc bd be cd ce de

(b) The bipartite auxiliary graph for the optimization.

Fig. 6. The 5-node example network with larger radius.

to further investigate Subproblem 2, including the case of general cable installation cost.

IV. ALGORITHMICFRAMEWORK FOR THEGEOMETRIC

NETWORKAUGMENTATION(GNA) PROBLEM

Before we provide the problem formulation, let us discuss a small, five node ring network shown in Fig. 5. Using an argument similar to the one used at the single edge network example, we can draw the danger zones, which are epicenters of failures that will result in isolated network components.

We have five such danger zones, denoted by Z1, . . . , Z5, each defining a cut in the graph. For example a failure with epicenter in Z1 would isolate a network with node a from {b, c, d, e}. To protect the network against a failure of an epicenter in Z1, we need to add a new link, whose distance to the danger zoneZ1 is at least r. We draw the boundaries of ther-inflated danger zones by red dotted lines, there are 5 such areas denoted by R1, . . . ,R5, as shown in the table on the right of Fig. 5a.

Fig. 5b shows the optimal solution for the problem of Fig.

5a. Each new edge has a unique color, and we color the danger zone according to the edge it is protected by. Recall that there are 5 danger zones, and the new gray edge protects Z1 and Z2, the blueZ3, and the greenZ4andZ5. Here every danger zone is protected by a single curve.

Fig. 6a shows how complicated the situation becomes for larger r. Here we have 11 danger zones, and some danger

(6)

Geometric graph (G= (V,E), and node coordinates),

maximum radiusr Partitioning of the 2D plane

Identification of danger zones

Z1, . . . , Zk Generation of cuts for each

danger zone, see Fig. 6a

Bipartite graph construction,

see Fig. 6b

Optimization Shortest r-detour

path calculation

Set of new edges & costs.

For each new edge the cable route.

Fig. 7. Flowchart for the generic steps required to solve the GNA problem. Note that the sub-problem described in sec. III (coloredredon the figure) must be solved for many configurations during the optimization.

zones cut the graph into three components, for example, Z2. The optimal solution is shown on Fig. 5c, where we have 3 new edges: the black, blue, and green, with their corresponding danger zones colored accordingly. The danger zone Z2 is plotted in blue-gray mixed color because the corresponding three components are connected with two edges: the gray and blue.

A. Non-linear Mathematical Program Formulation

Let us formulate the problem as a mathematical program.

See Fig. 7 for the flowchart of the whole optimization process.

First, we draw a radius r circle around each node of the graph. For each edge, we also add two parallel line-segments with the same length and distance r from the edge on both sides, see Fig. 6. These curves will divide the plane into faces, and their collection is called an arrangement. Computing an arrangement of a set of (simple) geometric objects (e.g., disks, rectangles) in the plane is a well-studied problem, and the number of faces is at mostO(m2), see also [49]. Every point of a face selected as an epicenter of a disk failure hits the same set of edges and nodes, called residual network Gc. The faces where the corresponding residual network is not connected, are the danger zones Z1, . . . , Zk.

Now we can formulate a discrete optimization problem.

First we will evaluate each face, compute the residual network Gc and its number of components t. If t = 2 we call them disaster cuts. Otherwise, if the danger zones separate the graph intot≥3components (e.g.Z2 on Fig. 6a), we will convert it into a set of disaster cuts. In this case we add2t−1−1disaster cuts: every combination of two component cuts: for example danger zoneZ2with 3 componentsa|b|deon Fig. 6a should be transformed into 3 disaster cuts:a|bde,b|adeandab|de. Note that, a danger zone with four components A|B|C|D would be transformed into the following 7 disaster cuts: A|BCD, B|ACD,C|ABD,ABC|D,AB|CD,AC|BDandAD|BC.

Finally, we merge any two disaster cuts if they result in the same set of nodes, see the table on Fig. 6b. Letlbe the number of disaster cuts after merging the list. It is11for the example of Fig. 6.

Finally, we can formulate the problem as a (nonlinear) optimization problem as follows: we define a bipartite graph (Vnn, Vz, Ez) as shown in Fig. 6b. Each node in Vz corre- sponds to a disaster cut, thus |Vz| = l. Each node in Vnn corresponds to a distinct node-pair a,b ofV, i.e.a6=b. Note that we can erase those node-pairs that cannot protect any

disaster cut. We have also |Vnn| ≤ n(n−1)2 . As for the edges, we connect every nodevab ∈Vnn andvi∈Vz, if connecting nodeawith nodebwould connect the two sides of the disaster cutvi.

For each edge betweenvi∈Vz andabVnn we have the following binary variable:

xabi =





1 add link(s) betweena andb that connects the two sides of disaster cut vi,

0 otherwise.

(1) The only constraints we have that every danger cut must be protected:

X

∀(vab,vi)∈Ez

xabi ≥1 i= 1, . . . , l. (2) The objective function is as follows:

minimize: X

∀vab∈Vnn

|CZab

ab|, (3)

whereZabdenotes the union of danger zones for eachvisuch that xabi = 1. It is the cost of the shortest curve(s) between nodesa andb protecting a set of danger zones, computed by the heuristic presented in Sec. III.

With the above problem formulation, we have divided GNA into a master problem and separate sub-problems. The sub- problems are how to computeCZab, i.e., the minimum cost cable routes between given end nodes and danger zones presented in Sec. III. The master problem is considered in this section, it is to determine how to select the end nodes of the new edges and decide which new edge protects each danger zone. Note that sinceCZab is solved with a heuristic, the optimal solution of the mathematical problem may not be the global optimum for the GNA problem.

B. Greedy Baseline Heuristic (GBH)

Our first heuristic to solve the master problem is a greedy algorithm based on a greedy iterative search. It takes advantage of Lov´asz’s approach for minimum set cover, where the items correspond to disaster cuts, and the sets correspond to new edges. However, in our problem, we have a sophisticated cost function of the sets covering the items, i.e.,CZab.

The heuristic algorithm chooses the most feasible-looking edge from the left side of the bipartite graph in each iteration.

Other factors can help choose the next edge, for example, the

(7)

average cost per protected cut, or the number of cuts protected by the edge, but in this study, the cheapest edge is selected.

After the selection is made, the algorithm deletes the se- lected edge with all its neighboring cuts from the right side (as they are now protected). It continues this choose-delete loop until we are left with no cuts in the bipartite disaster graph.

The selected edges will protect every cut since the condition for stopping is that there are none of them left unprotected, but this process may cause significant overhead.

C. Integer Linear Program (ILP)

The problem formulated by Eq. (1) and (2) has a nonlinear cost function (3). Next we reformulate the nonlinear opti- mization problem into an Integer Linear Program (ILP). The ILP will have an exponential number of working variables.

Roughly speaking through a new set of 0,1-variables z the formulation will contain all executions of CZab. Note that the possible inputs ofCabZ are the node pairab, and a set of danger zones corresponding to the edges adjacent with vab in the bipartite graph, i.e., subsets of N(vab). Let Sab denote the set of every possible nonempty subsets of edges connected to node vab ∈Vnn in the bipartite graph, in other words the power set P(N(vab)) minus the empty set. Note that there are 2|N(vab)| −1 such sets. Let S = ∪vab∈VnnSab denote the union of them for all nodes in Vnn. We have a total of

|S|=P

ab∈Vnn|Sab|binary variables, we denote them by zs for s∈S. In other words, each variable zs corresponds to a node pairab and a (sub)set of danger zones (denote it byZs) it can protect. The linear objective function is

minimize: X

∀vab∈Vnn

X

∀s∈Sab

|CZabs| ·zs . (4) The constraints are

X

∀s∈S|i∈Zs

zs≥1 ∀vi∈Vz (5) where i∈ Zs means the danger zone corresponding to vi is part of the danger zone setZs.

Roughly speaking, the reformulated ILP has variables that correspond to edge sets in Ez, instead of having a variable for each independent edge of Ez. Therefore this problem formulation is significantly larger than the one in Sec. IV-A;

however, it has a linear objective function.

Note that in general, solving an ILP can be computationally hard; however, in our case, it takes significantly less time than to run the SDP heuristic many times. The latter task is necessary when formulating the ILP. Later in the experimental section, we will show that the number of danger zones is small in practice. Further note that the ILP solution is not guaranteed to be an optimal solution to the proposed GNA problem since it uses the results of a heuristic algorithm for the SDP.

D. Dual LP Heuristic (DLPH)

Next, we introduce a Dual LP Heuristic (DLPH) to replace the ILP in the previous scheme for achieving a reduced number of variables and thus reduced running time. It is clear that

the dual LP has only |Vz| variables, and we use only a small portion of constraints of the dual of the previous ILP formulation, thus yielding way less computation complexity.

Note that the weak duality theorem does not apply in this case, and thus the dual LP does not provide a lower bound for the ILP.

Next, we provide the dual LP formulation of the problem.

Letyidenote a variable assigned to each disaster cutvi∈Vz, which is intuitively the cost of protecting disaster cut i. The goal is to

maximize: X

vi∈Vz

yi . (6)

The constraints are given in the following X

∀vi∈Vz|i∈Zs

yi ≤ |CZab

s| ∀s∈Sab,∀vab∈Vnn . (7) Note that S is composed of the power sets of N(vab) for ∀vab ∈ Vnn. To reduce the time we only generate one constraint for eachvab, corresponding to setN(vab). Finally, we transform the dual solution into a binary primal one, where we count on the fact that each dual constraint shall correspond to a variable in the primal. More precisely, if the dual constraint is tight, the corresponding primal variable is set to 1. A constraint is called tight if the inequality holds with equality in the optimal solution.

The above heuristic can also be explained just using the primal problem. In this case, we solve a traditional set cover problem where the items correspond to disaster cuts, and the sets correspond to possible new edges. The cost of a set corresponding to the new edgeab equals to|CNab(vab)|. In other words, we limit the search space to the case where each new edge ab protects every danger cut where a and b are on the opposite sides of the cut.

V. EXPERIMENTALRESULTS

In this section, we present numerical experimental results by using real backbone network topologies to demonstrate the merits of the proposed three heuristics: GBH (Sec. IV-B), ILP (Sec. IV-C), and DLPH (Sec. IV-D). We investigate various aspects of system performance, e.g., how the given disk radius values ror the network density impacts the overall cost and running time.

Our algorithms are implemented1 in Python with binding to two open-source C++implementations: the 2D Arrangements package from the CGAL library2 for computing divisions of the plane, and the SIG class toolkit3 for offsetting polygons and geometric Dijkstra algorithm with a uniform cost. We used the SDP heuristic of Sec. III-C to compute the multi-curve solution. For practical considerations, we ignore extremely narrow danger zones.

1All experimental results with additional networks, as well as the source code are available online https://github.com/hajduzs/netext including the net- work typologies and the obtained list of curves.

2https://www.cgal.org/

3https://bitbucket.org/mkallmann/sig/wiki/Home

(8)

(a) The solution by ILP (and DLPH) (b) The solution by GBH The ILP suggests to add two new edges (black and green). Here GBH

suggests three more edges, because it is prioritizing shorter (less costly) edges.

The ILP adds the blue edge to protect two potentially isolated points by connecting them together.

It is achived by two edges in GBH.

The ILP connects with two new edges a large number of danger zones. The greedy heuristic selects more shorter edges, some of them go by hugging existing edges.

Two larger danger zone-groups are protected by adding a new edge to the degree 3 node on the side, as well as the degree 2 node a bit to the east.

ILP suggest a new edge connecting to the inner area of the topology.

The optimization (both ILP and GBH) suggests adding some expensive new edges, such as the pink edge. It runs in parallel with an existing

edge since there is no other danger zone that must be protected nearby. It ensures the most south node is not isolated due to a disaster.

Fig. 8. GNA Problem Solution for Tata (India) backbone network (r= 80km).

A. ILP vs GBH for India (Tata) Backbone Network

First we present the results of using ILP and GBH on the Tata (India) backbone network, respectively, aiming to highlight the performance gap between the two schemes.

The goal of the optimization is to protect disasters of radius r = 80km. A few recent examples of natural disasters with affected areas of larger radius are the Uttarakhand Flash Floods4in 2013, the Kashmir Floods5in 2014, and the tropical Cyclone Amphan6 in 2020.

Fig. 8 shows the new edges suggested by the ILP as well as the GBH algorithm. The danger zones and the corresponding new edges are drawn with the same color. In total, 87 danger zones have to be protected, which results in 49 cuts.

The ILP solution in Fig. 8a shows the enhancement of the India network to ber= 80km disaster-resilient. It requires13 new edges with a total length of3425km, i.e.,17%additional cable is necessary. In the rest of the section, for the cost comparison, we utilize the metricC%, which is the new edge length divided by the total length (given in %).

As a comparison, GBH requires 27new edges with a total length of 5085km, meaning C% = 25% additional cable length is needed, i.e., when utilizing the heuristic 41% extra cable length is needed. However, the running time (denoted as t) of the ILP is 88min compared with18min by the GBH.

Nonetheless, the GBH solutions result in approximately twice more edges (some even cut through existing edges see Fig.

8b), which are not considered useful in quality. It comes from the greedy nature of GBH, where the shortest (less costly) edges are selected at the beginning, leading to a larger total length at the end, as shown in the examples of Fig. 8.

Every danger zone is protected by a single curve SDP solution. Note that many of the short edges run almost parallel to the existing ones next to degree2nodes. It is a consequence of uniform cable installation costs. In the case of general cable cost, we could set the cable installation cost small if the cables

4https://reliefweb.int/sites/reliefweb.int/files/resources/IND UttarandLocationmap 130628.pdf 5https://sphereindiablog.files.wordpress.com/2014/09/04jkflood relief- camps jammu- division sept.jpg 6https://reliefweb.int/sites/reliefweb.int/files/resources/Sitrep- Cyclone- AMPHAN- 3.pdf

should be deployed along with existing cables, which would avoid using these parallel new edges.

In general, we can observe that most of the edges are added due to the2degree nodes, especially outside the network core.

As expected, all the new edges follow the single edge solution, and all the cuts divide the network into two components. The relationship between the metrics is further discussed in the performance evaluation section.

B. Performance Evaluation

For the performance evaluation of the algorithms, we se- lected eleven additional topologies and analyzed the results for various radii. The summary of the experimental results is shown for each network in Table I (for r = 40km and r= 80km) and some of the main tendencies are displayed in Fig. 9.

In Table I we can observe that the cost of the new edges by the ILP is below 17% in each scenario and, on the average it is 9.4% for r= 40km and 10.8% forr= 80km. For simpler cases, GBH yields a solution with performance very close to the ILP, while much outperformed in more complicated cases.

With the GBH heuristic, the cost was always below 25%, and the GAP was at most 63%. Besides, Table I shows that with the number of danger zones between3and116, maximally46 cuts are in place. As expected, the larger networks (i.e., with more nodes and edges), there are more danger zones and cuts in the networks, leading to a larger number of constraints and thus higher complexity. Nonetheless, the total cost is related to neither the number of danger zones and thus the number of cuts, nor the number of new edges required in a solution (which ranges from2 to even 14).

Fig. 9a shows the runtime and solution quality tradeoff for the three algorithms GBH, DLPH, and ILP. It is an average of 12×20 runs, where we have 12 networks, as shown in Table I, and radii r = 5,10, . . . ,100km. The runtime of each algorithm for every network can be seen in Table I for r = 40,80km. The chart shows that the ILP has the longest average runtime (i.e., 5 minutes). On average, DLPH is faster

(9)

TABLE I

SUMMARY OF THE EXPERIMENT RESULTS FOR VARIOUS PRACTICAL NETWORK TOPOLOGIES. THE FOLLOWING METRICS ARE SHOWN:THE NUMBER OF DANGER ZONES(|Z|)AND DANGER CUTS(|VZ|),THE SIZE OF THEILPIN TERMS OF VARIABLES(|EQ|),THE GAP(GAP)TO THE OPTIMAL SOLUTION

OFSEC. IV-A,THE TOTAL LENGTH OF THE NEW EDGES DIVIDED BY THE TOTAL CABLE LENGTH IN PERCENT(C%),THE NUMBER OF NEW EDGES ADDED(|En|)AND THE RUNNING TIME(t). THE COLUMNS WITH THE SOLUTIONS OFDLPHARE OMITTED AS THEY ARE THE SAME AS FORILP.

Backbone network topology r= 40km r= 80km

|V| |E| total edge danger ILP DLPH GBH danger ILP DLPH GBH

Name length (km) |Z| |VZ| |Eq| C% |En|t(s) t(s) GAP C% |En|t(s) |Z| |VZ| |Eq| C% |En| t(s) t(s) GAPC% |En| t(s)

Gridnet (US) [50] 9 20 42635 12 6 108 10 2 4.90 3.71 4.85 10 4 1.02 10 5 67 10 2 3.65 3.20 35 14 4 0.82

GlobalCenter (US) [50] 9 36 57165 5 3 27 4.07 3 4.61 4.51 0 4.07 3 0.19 7 4 38 5.08 3 4.48 4.21 1.47 5.16 4 0.29

Pan-European [22] 16 22 6321 4 4 66 16 4 3.97 3.63 0 16 4 0.19 6 5 100 22 4 3.87 3.81 6.55 24 5 0.59

Electric Lightwave [50] 20 30 23698 10 6 148 5.43 4 4.43 3.82 22 6.66 6 1.38 11 8 304 5.86 5 6.53 4.47 34 7.87 7 3.02

COST (EU) [22] 22 45 24475 5 5 115 12 4 4.02 4.17 18 15 5 0.55 5 5 115 13 4 3.71 3.79 17 15 5 0.53

US nationwide [22] 24 42 27218 6 6 153 6.17 4 3.69 3.59 29 8.02 6 0.70 6 6 153 6.51 4 4.06 3.74 27 8.32 6 0.66

France [51] 25 45 11487 58 17 2251 9.61 7 558 40 39 12 11 115 116 35 59332 14 8 55128 104 63 23 18 764

Darkstrand (USA) [50] 28 31 14411 5 5 145 8.02 3 3.65 3.50 49 11 5 0.58 6 6 205 9.23 3 3.66 3.52 38 12 5 0.65

Nobel (EU) [51] 28 41 16864 5 5 145 11 4 4.28 4.44 0 11 4 0.60 4 4 114 12 4 3.74 4.53 0 12 4 0.53

Pioro (random) [51] 40 89 24202 9 8 340 4.92 6 4.66 4.00 17 5.79 7 1.63 16 11 655 6.20 6 10 6.24 14 7.08 7 5.04

Telia (USA) [52] 44 65 30295 26 16 1078 13 11 27 10 31 18 15 77 34 17 1783 14 9 55 13 41 20 15 108

Tata (India) [53] 70 97 20047 40 27 6468 13 14 226 31 37 18 21 445 87 49 56149 17 13 5290 71 41 25 27 1096

than GBH because it requires less computation of CabZ, which is the dominant factor if the radius r is large and there are more danger zones close to each other in place. Nevertheless, DLPH finds a solution with a slightly higher cost than ILP.

Fig. 9b shows the aggregated relative cost versus the radii of each algorithm. DLPH finds the same solution as the ILP for r ≤ 80km, and there is little difference for larger radii where we have a more complex arrangement structure due to a large number of overlapping geometric objects, see also Fig. 6. Overall, DLPH outperforms both ILP and GBH when optimizing jointly for cost and running time.

In Fig. 9b, it can be observed that the ILP solution scales very well with the radii, where the protection costs increase linearly with a small slope as a function of r. This is also attested by the fact that doubling the radii (from 40km to 80km) only yields around 1% increase in cost, as shown in Table I.

Fig. 9c shows the average number of new edges for all networks, which increases modestly as the radiusr increases.

Specifically, we need an average of 4.7 new edges to protect disasters at r = 20km and slightly more 5.2 new edges at r = 100km. Note that the GBH solution yields more short links, where altogether 1% are two curve SDP solutions (15 out of1169new edges); while the DLPH solution yields only 0.1% (1out of616new edges) as it tends to select longer edges than GBH. In the case of the ILP, on the other hand, since every danger zone was protected by a single curve (there were 441new edges in total), thus rarely yielding a two curve SDP solution. Finally, Fig. 9d presents how the average numbers of danger zones and cuts scale as a function of the radius r.

It shows that the number of cuts increases more slowly than that of the danger zones.

VI. CONCLUDINGREMARKS

In this paper, we investigate the augmentation of the topol- ogy of a backbone network with new cables to maintain network connectivity under regional failures. A novel design framework, namely Geometric Network Augmentation (GNA), is introduced, which targets to identify a set of cable routes that can protect each danger zone. We divide the overall

problem into a master problem and a separate sub-problem.

The sub-problem determines the optimal cable route(s) for a given pair of nodes, while the master problem aims to select the end nodes for allocating the new cable routes and decide which new cable route protects each danger zone.

The proposed solutions, namely ILP, GBH, and DLPH, are examined via extensive simulation in a number of practical network topologies. Our findings from the simulations are summarized as follows.

The nodes with outgoing connections in diversified di- rections (e.g., the nodes in the geometrical center of the network) rarely require additional protection edges. On the other hand, the degree 2 (and 1) nodes connected with an acute angle are often in need of protection, where a potential disaster could make the nodes isolated.

High computation complexity usually arises due to the network regions with a large number of highly connected nodes, where a disk failure cuts the graph into several components, leading to an exponential number of 2-cuts.

The ILP yields solutions with the best quality among the three proposed algorithms at the expense of the longest running time. DLPH, on the other hand, is observed to achieve the best tradeoff between the running time and cost. It is recommended for practical application scenarios.

ACKNOWLEDGMENT

We would like to thank Marcelo Kallmann for the guide on the SIG code; Amaro de Sousa, Martin Zachariasen, David Hay, Bal´azs Vass for the inspiring discussions.

The research leading to these results was partially supported by the High Speed Networks Laboratory (HSNLab). This arti- cle is based on work from COST Action CA15127 (“Resilient communication services protecting end-user applications from disaster-based failures” – RECODIS), supported by COST (European Cooperation in Science and Technology). Projects no. 123957, 129589, 124171, 134604 and 128062 have been implemented with the support provided from the National Research, Development and Innovation Fund of Hungary, financed under the FK 17, KH 18, K 17, FK 20 and K 18

Hivatkozások

KAPCSOLÓDÓ DOKUMENTUMOK

We have proved that computing a geometric minimum-dilation graph on a given set of points in the plane, using not more than a given number of edges, is an NP-hard problem, no matter

Keywords: heat conduction, second sound phenomenon,

In this paper we presented our tool called 4D Ariadne, which is a static debugger based on static analysis and data dependen- cies of Object Oriented programs written in

If the set of the kernels is empty then the network has no unique solution (see Theorem 1). Because of Theorem 3 the network has a unique solution unless fK=O. At the

The summary of gene set (DEG vs. pathways or TFs) connections in the global network was performed using NEA. For description of the computational procedure see “ Network

The European Geoparks Network (EGN) is a regional branch of the Global Geoparks Network (GGN) and the Novohrad- Nógrád. Geopark is a member

Note that the L-UFL m-trail allocation problem under node failures cannot be analyzed by transforming the topology into a line graph 3 and reusing the reported results for

Note that the L-UFL m-trail allocation problem under node failures cannot be analyzed by transforming the topology into a line graph 3 and reusing the reported results for